- Cryptography and Data Security
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Privacy-Preserving Technologies in Data
- Service-Oriented Architecture and Web Services
- Vehicular Ad Hoc Networks (VANETs)
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- IPv6, Mobility, Handover, Networks, Security
- Distributed and Parallel Computing Systems
- Advanced Computational Techniques and Applications
- Network Packet Processing and Optimization
- Mobile Agent-Based Network Management
- Software-Defined Networks and 5G
- Distributed Sensor Networks and Detection Algorithms
- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Target Tracking and Data Fusion in Sensor Networks
- Robotic Path Planning Algorithms
- Topic Modeling
- Security and Verification in Computing
- Internet Traffic Analysis and Secure E-voting
- Access Control and Trust
North China Electric Power University
2025
China Electric Power Research Institute
2025
Henan Polytechnic University
2009-2024
University of California, Irvine
2013-2024
Anhui University
2018-2024
Beihang University
2023
Sias University
2023
Beijing Jiaotong University
2019-2021
Lamar University
2020
PLA Information Engineering University
2020
With an increasing number of cloud service providers (CSPs), research works on multi-cloud environments to provide solutions avoid vendor lock-in and deal with the single-point failure problem have expanded considerably. However, a few schemes focus conditional privacy protection authentication vehicular networks under environment. In this regard, we propose robust extensible scheme for fulfil ever-growing diversified demands from users. According our solution, vehicles need register trusted...
Based on the functional characteristics of inter-vehicle communication networks under current framework, a privacy-preserving authentication framework that combines fifth-generation technology (5G) and edge computing is proposed. The proposed different from used in previous 802.11p-based network architecture, we use device-to-device to achieve between vehicles. One difference 5G-enabled model traditional for vehicle ad hoc secure vehicles challenging. protocol this study can be divided into...
Bitcoin, the world's first decentralized digital currency, offers a high degree of security and transparency with its distributed network based on blockchain technology. However, widespread use Bitcoin other systems, cyberattacks have become one major issues threatening their stability security. Among them, BDoS (Blockchain Denial Service) attacks SDoS (Selfish attacks, as new types denial-of-service especially pose significant threat to network. Since adopts Proof Work (PoW) mechanism,...
With the increasingly severe global energy crisis and environmental pollution problems, new vehicles, as an important alternative to traditional fuel have achieved rapid development. As of January 2024, total number charging infrastructure nationwide has reached 8.861 million units, a year-on-year increase 63.7%, there are 3624 battery swap stations. The popularity vehicles puts forward higher requirements for infrastructure. supply station public charging, swapping stations access, storage...
Network meta-analysis expands the scope of a conventional pairwise to simultaneously compare multiple treatments, synthesizing both direct and indirect information thus strengthening inference. Since most trials only two typical data set in network managed as trial-by-treatment matrix is extremely sparse, like an incomplete block structure with significant missing data. Zhang et al. proposed arm-based method accounting for correlations among different treatments within same trial assuming...
The development of mobile-health technology has the potential to revolutionize personalized medicine. Biomedical sensors (e.g., wearables) can assist with determining treatment plans for individuals, provide quantitative information healthcare providers, and give objective measurements health, leading goal precise phenotypic correlates genotypes. Even though treatments interventions are becoming more specific datasets abundant, measuring causal impact health requires careful considerations...
Information fusion using evidence theory in wireless sensors networks has been used extensively to identify targets because it offers the advantage of handling uncertainty. But classical Dempster's combination rule cannot deal with highly conflicting information often generates counterintuitive results. In this paper, a new weighted approach is proposed solve problem. First, two measures, i.e., contradiction measure each body (BOE) and probabilistic-based dissimilarity between BOEs, are...
Content distribution networks (CDNs) which serve to deliver web objects (e.g., documents, applications, music and video, etc.) have seen tremendous growth since its emergence. To minimize the retrieving delay experienced by a user with request for object, caching strategies are often applied - contents replicated at edges of network is closer such that distance between object reduced. In this literature survey, evolution studied. A recent research paper [15] in field large-scale CDN was...
To achieve interconnection and interoperability among different devices in home network environment, such as TV, PAD, computer. Several digital protocol standards, UPnP, Java Intelligent Network Infrastructure (Jini), IGRS, etc, are proposed. But, based on these protocols cannot discover or control each other, so it is very important to devices. A method of between IGRS UPnP Open Service Gateway Initiative (OSGI) platform proposed this paper. service agent the OSGI designed. This paper...
Adding self-healing capabilities to network management systems holds great promise for delivering important goals, such as QoS, while simultaneously lowering capital expenditure, operation cost, and maintenance cost. In this paper, we present a model-based approach add fault system cellular networks. We propose generic modeling framework categorize software failures specify their dispositions at the model level target system. This facilitates deployment of control loop adding autonomic into...
ABSTRACT The development of mobile-health technology has the potential to revolutionize personalized medicine. Biomedical sensors (e.g. wearables) can assist with determining treatment plans for individuals, provide quantitative information healthcare providers, and give objective measurements health, leading goal precise phenotypic correlates genotypes. Even though treatments interventions are becoming more specific datasets abundant, measuring causal impact health requires careful...
With the advent of large-scale social networks, two communication users need to generate session keys with help a remote server communicate securely. In existing three-party authenticated key exchange (3PAKE) protocols, users’ passwords be stored on server; it cannot resist disclosure attack. To solve this security problem, we propose more efficient 3PAKE protocol based verification element by adopting public-key cryptosystem and approximate smooth projection hash (ASPH) function an ideal...
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need identify the exposure by screening content in storage and transmission, i.e., detect information being stored or transmitted clear. However, detecting is challenging due transformation content. Transformations (such as insertion, deletion) result highly unpredictable patterns. Existing automata-based string matching algorithms are impractical for transformed leaks, because its...
With the rapid development of edge computing and Internet Things, problem information resource sharing can be effectively solved through multi-party collaboration, but risk data leakage is also increasing. To address above issues, we propose an efficient private set intersection (MPSI) protocol via a multi-point oblivious pseudorandom function (OPRF). Then, apply it to work on specific commercial application: caching. The proposed MPSI uses transfer (OT) together with probe-and-XOR strings...
Recently, security policies and behaviour detection methods have been proposed to improve the of blockchain by many researchers. However, these cannot discover source typical behaviours, such as malicious applications in environment. Android application is an important part operating environment, machine learning-based malware method significant for user security. The way constructing features determines performance. single-feature mechanism, training classifiers with one type features,...
In secure two-party computation, each party has its input and wants to jointly compute a function from which it obtains the output corresponding respective inputs. For achieving security against malicious adversary, an effective approach is using cut-and-choose, requires circuit constructor P1 construct S copies of C (C used F). The evaluator P2 selects S∕2 circuits open for check. If these are correctly constructed, assumes that remaining also constructed uses compute. However, this method...
Periodic narrowband signals and white noise are the main interferences in online detection localization of cable partial discharge (PD), however, existing research has always focused on suppression only, which is not line with actual scene. A novel de-noising method for effectively extracting random PD pulse from complex strong proposed this paper applied to localization. Firstly, an improved adaptive variational mode decomposition (AVMD) used decompose periodic interference, noise, signal...